DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
46132a1a55c7f63394e7a6fca68a85e1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46132a1a55c7f63394e7a6fca68a85e1_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
46132a1a55c7f63394e7a6fca68a85e1_JaffaCakes118
Size
840KB
MD5
46132a1a55c7f63394e7a6fca68a85e1
SHA1
77253b581d7deaa4f49c8ec99397643c532973ea
SHA256
9ce29ad56a2157cb8c42db0bb6c9126861ee37e0490b114376394580e4d3e82e
SHA512
0c10637b0df1d864f07297d380b50f08457cebe994bd8291727e257aa4c47e4f0ee742a87e518871a8f0fafb5746a79164da16791407d81f33b9adc2dac05cb5
SSDEEP
12288:se63fo/ad94EYe59md4kS3IrJlTXVdjr8ILQmOxTEoLl+jLkR:P63foC9jD59e7TFdjrLITBoQR
Checks for missing Authenticode signature.
resource |
---|
46132a1a55c7f63394e7a6fca68a85e1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
NdrClientCall2
RpcBindingFree
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcStringFreeA
ioctlsocket
gethostbyname
WSAGetLastError
WideCharToMultiByte
lstrlenA
OpenFileMappingA
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetVolumeInformationA
GetCurrentProcess
GetLocalTime
GetTimeZoneInformation
GetComputerNameA
GetACP
OpenProcess
TerminateProcess
DuplicateHandle
GetCurrentThread
CreateMutexA
ReleaseMutex
FlushFileBuffers
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
CreateProcessA
FormatMessageA
WaitForMultipleObjects
OpenEventA
ExpandEnvironmentStringsA
GetVersionExA
RemoveDirectoryA
DeviceIoControl
FileTimeToSystemTime
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
InterlockedDecrement
GetShortPathNameA
GetLocaleInfoA
GetDriveTypeA
HeapSize
GetStdHandle
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDateFormatA
GetTimeFormatA
RaiseException
FileTimeToLocalFileTime
CreateThread
ExitThread
RtlUnwind
GetSystemTimeAsFileTime
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
DisableThreadLibraryCalls
GetCurrentProcessId
SetLastError
ResetEvent
GetModuleHandleA
SetThreadPriority
CopyFileA
TerminateThread
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FreeEnvironmentStringsW
SetEndOfFile
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
FindNextFileA
FindClose
InitializeCriticalSection
CreateEventA
ResumeThread
SetEvent
InterlockedIncrement
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
DeleteCriticalSection
GetDiskFreeSpaceA
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
Sleep
ReadFile
SetFilePointer
CloseHandle
VirtualProtect
GetModuleFileNameA
GetFileType
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
WriteConsoleW
CompareStringA
CompareStringW
GetFullPathNameA
SetEnvironmentVariableA
CallNextHookEx
UnregisterHotKey
RegisterHotKey
LoadIconA
ToAsciiEx
GetKeyboardLayout
CreatePopupMenu
AppendMenuA
TrackPopupMenu
DestroyMenu
LoadImageA
SetTimer
EnumWindows
GetKeyNameTextA
GetAsyncKeyState
GetKeyboardLayoutNameA
FindWindowA
GetWindowThreadProcessId
OpenDesktopA
OpenInputDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
GetUserObjectInformationA
SetThreadDesktop
SetProcessWindowStation
CloseDesktop
CloseWindowStation
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExA
GetSystemMetrics
LoadCursorA
MessageBoxA
LoadStringA
ExitWindowsEx
GetWindowTextA
GetWindowTextLengthA
SendMessageA
DialogBoxParamA
SetWindowTextA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
PostThreadMessageA
GetClassNameA
GetWindowRect
GetDC
ReleaseDC
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
DestroyWindow
UnregisterClassA
RegisterClassA
CreateWindowExA
GetWindowLongA
DefWindowProcA
IsWindow
SetWindowLongA
GetCursorPos
PostMessageA
wsprintfA
GetForegroundWindow
GetKeyState
GetDeviceCaps
DeleteObject
DeleteDC
CreateDIBSection
CreateCompatibleDC
GdiFlush
BitBlt
SelectObject
CreateCompatibleBitmap
CreateDCA
GetStockObject
RegCloseKey
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
LogonUserA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RevertToSelf
GetSidLengthRequired
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
StringFromCLSID
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
VARIANT_UserMarshal
SafeArrayLock
SafeArrayCreate
VariantInit
VariantClear
SysAllocStringLen
SysFreeString
VARIANT_UserSize
SafeArrayUnlock
VARIANT_UserUnmarshal
VARIANT_UserFree
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ